The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Myong H. Kang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Myong H. Kang, Ira S. Moskowitz
    A Pump for Rapid, Reliable, Secure Communication. [Citation Graph (1, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:119-129 [Conf]
  2. Myong H. Kang, Brian J. Eppinger, Judith N. Froscher
    Tools to Support Secure Enterprise Computing. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:143-0 [Conf]
  3. Myong H. Kang, Judith N. Froscher, Brian J. Eppinger
    Towards an Infrastructure for MLS Distributed Computing. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:91-100 [Conf]
  4. Myong H. Kang, Judith N. Froscher, Ira S. Moskowitz
    An Architecture for Multilevel Secure Interoperability. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1997, pp:194-204 [Conf]
  5. Myong H. Kang, Ira S. Moskowitz, Stanley Chincheck
    The Pump: A Decade of Covert Fun. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:352-360 [Conf]
  6. Myong H. Kang, Ira S. Moskowitz, Bruce E. Montrose, James J. Parsonese
    A Case Study Of Two Nrl Pump Prototypes. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1996, pp:32-43 [Conf]
  7. Myong H. Kang, Judith N. Froscher, Amit P. Sheth, Krys Kochut, John A. Miller
    A Multilevel Secure Workflow Management System. [Citation Graph (0, 0)][DBLP]
    CAiSE, 1999, pp:271-285 [Conf]
  8. Oliver Costich, Myong H. Kang
    Maintaining Multilevel Transaction Atomicity in MLS Database Systems with Replicated Architecture. [Citation Graph (0, 0)][DBLP]
    DBSec, 1993, pp:329-355 [Conf]
  9. Oliver Costich, Myong H. Kang, Judith N. Froscher
    The SINTRA Data Model: Structure and Operations. [Citation Graph (0, 0)][DBLP]
    DBSec, 1994, pp:97-110 [Conf]
  10. Myong H. Kang, Oliver Costich, Judith N. Froscher
    A Practical Transaction Model and Untrusted Transaction Manager for a Multilevel-Secure Database System. [Citation Graph (0, 0)][DBLP]
    DBSec, 1992, pp:285-300 [Conf]
  11. Myong H. Kang, Judith N. Froscher, Brian J. Eppinger, Ira S. Moskowitz
    A Strategy for an MLS Workflow Management System. [Citation Graph (0, 0)][DBLP]
    DBSec, 1999, pp:161-174 [Conf]
  12. Ira S. Moskowitz, Myong H. Kang
    The Modulated-Input Modulated-Output Model. [Citation Graph (0, 0)][DBLP]
    DBSec, 1995, pp:61-75 [Conf]
  13. Ira S. Moskowitz, Myong H. Kang, LiWu Chang, Garth E. Longdon
    Randomly roving agents for intrusion detection. [Citation Graph (0, 0)][DBLP]
    DBSec, 2001, pp:135-149 [Conf]
  14. Myong H. Kang, Judith N. Froscher, Ira S. Moskowitz
    A framework for MLS interoperability. [Citation Graph (0, 0)][DBLP]
    HASE, 1996, pp:198-205 [Conf]
  15. Jim Luo, Bruce E. Montrose, Anya Kim, Amitabh Khashnobish, Myong H. Kang
    Adding OWL-S Support to the Existing UDDI Infrastructure. [Citation Graph (0, 0)][DBLP]
    ICWS, 2006, pp:153-162 [Conf]
  16. Anya Kim, Amitabh Khashnobish, Myong Kang
    An Architecture for Web Services Authentication and Authorization in a Maritime Environment. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:451-456 [Conf]
  17. Myong H. Kang, Oliver Costich, Judith N. Froscher
    Using Object Modeling Techniques to Design MLS Data Models. [Citation Graph (0, 0)][DBLP]
    Security for Object-Oriented Systems, 1993, pp:203-211 [Conf]
  18. Anya Kim, Jim Luo, Myong H. Kang
    Security Ontology for Annotating Resources. [Citation Graph (0, 0)][DBLP]
    OTM Conferences (2), 2005, pp:1483-1499 [Conf]
  19. Jim Luo, Bruce E. Montrose, Myong H. Kang
    An Approach for Semantic Query Processing with UDDI. [Citation Graph (0, 0)][DBLP]
    OTM Workshops, 2005, pp:89-98 [Conf]
  20. Gail-Joon Ahn, Ravi S. Sandhu, Myong H. Kang, Joon S. Park
    Injecting RBAC to secure a Web-based workflow system. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 2000, pp:1-10 [Conf]
  21. Myong H. Kang, Joon S. Park, Judith N. Froscher
    Access control mechanisms for inter-organizational workflow. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2001, pp:66-74 [Conf]
  22. Joon S. Park, Myong H. Kang, Judith N. Froscher
    A Secure Workflow System for Dynamic Collaboration. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:167-182 [Conf]
  23. Ira S. Moskowitz, Steven J. Greenwald, Myong H. Kang
    An Analysis of the Timed Z-channel. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:2-11 [Conf]
  24. Myong H. Kang, Judith N. Froscher
    A Framework for Secure Enterprise Computing. [Citation Graph (0, 0)][DBLP]
    WETICE, 2000, pp:219-220 [Conf]
  25. Myong H. Kang, Judith N. Froscher
    A Tool for Secure Inter-Organizational Computing. [Citation Graph (0, 0)][DBLP]
    WETICE, 2001, pp:194-199 [Conf]
  26. Myong H. Kang, Andrew P. Moore, Ira S. Moskowitz
    Design and Assurance Strategy for the NRL Pump. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1998, v:31, n:4, pp:56-64 [Journal]
  27. Myong H. Kang, Henry G. Dietz, Bharat K. Bhargava
    Multiple-Query Optimization at Algorithm-Level. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 1994, v:14, n:1, pp:57-75 [Journal]
  28. Ira S. Moskowitz, Steven J. Greenwald, Myong H. Kang
    An Analysis of the Timed Z-Channel. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1998, v:44, n:7, pp:3162-3168 [Journal]
  29. Myong H. Kang, Ira S. Moskowitz, Daniel C. Lee
    A Network Pump. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1996, v:22, n:5, pp:329-338 [Journal]

  30. A Peer-to-Peer Federated Authentication System. [Citation Graph (, )][DBLP]


Search in 0.037secs, Finished in 0.038secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002